0% found this document useful (0 votes)
11 views3 pages

NSC Lab 10

Uploaded by

Hussam Ather
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views3 pages

NSC Lab 10

Uploaded by

Hussam Ather
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Name: ALI SHER BAZ Reg.

No: 20-CP-93

Network Security and Cryptography Lab


Lab Report 10
Date: 5-04-2024

Submitted to: Sir Adnan Mustafa


Name: ALI SHER BAZ Reg. No: 20-CP-93

HOMOMORPHIC ENCRYPTION
Homomorphic encryption is a special type of encryption that allows certain types of
computations to be performed directly on encrypted data without the need for decryption. This
means that computations can be carried out on ciphertexts, resulting in encrypted results that,
when decrypted, are the same as if the operations had been performed on the plaintext.
How Homomorphic Encryption Works:
1. Encryption:
 In a homomorphic encryption scheme, data is encrypted using a public key,
resulting in ciphertexts.
 The encryption process ensures that even though the data is encrypted, certain
mathematical operations can still be performed on the ciphertexts.
2. Homomorphic Properties:
 Homomorphic encryption schemes possess homomorphic properties, meaning
they preserve the mathematical structure of the plaintext under certain operations.
 There are different types of homomorphisms, including:
 Additive Homomorphism: Allows addition operations to be performed
on ciphertexts, producing an encrypted result that, when decrypted, equals
the sum of the plaintexts.
 Multiplicative Homomorphism: Allows multiplication operations to be
performed on ciphertexts, producing an encrypted result that, when
decrypted, equals the product of the plaintexts.
 Fully Homomorphic Encryption (FHE): Allows both addition and
multiplication operations to be performed on ciphertexts, enabling
complex computations to be carried out on encrypted data.
3. Computation on Encrypted Data:
 With homomorphic encryption, computations are performed directly on the
ciphertexts without decryption.
 This enables data owners to outsource computation tasks to untrusted parties
while maintaining data privacy.
 Encrypted data can be sent to a cloud server, where computations are performed
on the ciphertexts, and the encrypted results are returned.
4. Decryption:
 After performing computations on the encrypted data, the result is decrypted
using a private key.
Name: ALI SHER BAZ Reg. No: 20-CP-93

 Decryption produces the same result as if the operations had been performed on
the plaintext data directly.
Applications of Homomorphic Encryption:
1. Secure Outsourcing of Computation:
 Homomorphic encryption enables secure computation outsourcing, allowing
sensitive data to be processed by untrusted parties while preserving privacy.
2. Privacy-Preserving Data Analysis:
 Data analysis can be performed on encrypted data without revealing the
underlying information, ensuring privacy protection.
3. Secure Cloud Computing:
 Homomorphic encryption enhances the security of cloud computing by enabling
secure storage and processing of encrypted data in the cloud.
4. Secure Machine Learning:
 Homomorphic encryption can be used to train machine learning models on
encrypted data without exposing sensitive information.
5. Secure Collaboration:
 Multiple parties can collaborate on data analysis tasks without sharing plaintext
data, ensuring confidentiality and privacy.

You might also like